Want to pass your GIAC Certified Intrusion Analyst GCIA exam in the very first attempt? Try Pass2lead! It is equally effective for both starters and IT professionals.
VCE
In which of the following IKE phases the IPsec endpoints establish parameters for a secure ISAKMP session?
A. IKE Phase 2.5
B. IKE Phase 2
C. IKE Phase 1
D. IKE Phase 1.5
Which of the following is the process of categorizing attack alerts produced from an IDS in order to distinguish false positives from actual attacks?
A. Alarm filtering
B. Confidence value
C. Reactive system
D. Site policy
Which of the following tools allows an attacker to intentionally craft the packets to gain unauthorized access? Each correct answer represents a complete solution. Choose two.
A. Fragroute
B. Ettercap
C. Mendax
D. Tcpdump